Analysis
-
max time kernel
94s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:51
Static task
static1
Behavioral task
behavioral1
Sample
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe
Resource
win10v2004-20230220-en
General
-
Target
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe
-
Size
700KB
-
MD5
418b8e3f9d85270634310c58bd9d3511
-
SHA1
d275d89cdfafdb24f5c7e8f89ba955a8091cba6d
-
SHA256
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8
-
SHA512
1f522dd3a23caacd0a668af3e863848ca2cda9c6c8008ef231a24f1088c90cf027046da17b4fccadec75d0ad0d9f865ea1e1b912fa824d95a112bfc4ca8f1fc3
-
SSDEEP
12288:TMr6y90smrMtFrlwFtI9DoNcAEAkNljlVQYPMSSfzUi34ZZv+eec:9yAQPpqPE3jlaYj+GPGeec
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6414.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6414.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1036-191-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-192-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-194-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-196-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-198-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-200-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-202-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-204-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-206-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-208-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-210-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-212-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-214-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-216-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-218-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-220-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-222-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline behavioral1/memory/1036-224-0x0000000004D30000-0x0000000004D6F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1228 un668813.exe 2000 pro6414.exe 1036 qu5748.exe 1376 si685972.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6414.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un668813.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un668813.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3624 2000 WerFault.exe 85 4380 1036 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2000 pro6414.exe 2000 pro6414.exe 1036 qu5748.exe 1036 qu5748.exe 1376 si685972.exe 1376 si685972.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2000 pro6414.exe Token: SeDebugPrivilege 1036 qu5748.exe Token: SeDebugPrivilege 1376 si685972.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4136 wrote to memory of 1228 4136 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe 84 PID 4136 wrote to memory of 1228 4136 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe 84 PID 4136 wrote to memory of 1228 4136 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe 84 PID 1228 wrote to memory of 2000 1228 un668813.exe 85 PID 1228 wrote to memory of 2000 1228 un668813.exe 85 PID 1228 wrote to memory of 2000 1228 un668813.exe 85 PID 1228 wrote to memory of 1036 1228 un668813.exe 94 PID 1228 wrote to memory of 1036 1228 un668813.exe 94 PID 1228 wrote to memory of 1036 1228 un668813.exe 94 PID 4136 wrote to memory of 1376 4136 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe 99 PID 4136 wrote to memory of 1376 4136 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe 99 PID 4136 wrote to memory of 1376 4136 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe"C:\Users\Admin\AppData\Local\Temp\7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un668813.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un668813.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6414.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6414.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 10804⤵
- Program crash
PID:3624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5748.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5748.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 13284⤵
- Program crash
PID:4380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si685972.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si685972.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2000 -ip 20001⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1036 -ip 10361⤵PID:3208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fc3823150120e9200b8a000eea6ce2cc
SHA1d4aded23d28cb2b3bf16e9a7b1b67f48ca28b706
SHA256f5e03c332506220eb74f218293585fa1aa5aeba33a9a5a52886ef23bcea6f8db
SHA5120427814dc19c3e16fe7f5fc36b9d81776aa5b76f01e52bfb746072e463a9a829e2b86669305e72ff003bebf73cf9784bbe74f7958a31812c1b495244ce74a913
-
Filesize
175KB
MD5fc3823150120e9200b8a000eea6ce2cc
SHA1d4aded23d28cb2b3bf16e9a7b1b67f48ca28b706
SHA256f5e03c332506220eb74f218293585fa1aa5aeba33a9a5a52886ef23bcea6f8db
SHA5120427814dc19c3e16fe7f5fc36b9d81776aa5b76f01e52bfb746072e463a9a829e2b86669305e72ff003bebf73cf9784bbe74f7958a31812c1b495244ce74a913
-
Filesize
558KB
MD5878246e11fbcd03ddeb376a24b420d43
SHA16d9dd68d62d580bb863cb0426c3ec51abdcc861c
SHA25697e3c4c4611fe0ba8b5a4cf5e62e230463916e5bd49787a2d9cbd52b011d12a0
SHA5121951b6bfa79a1d7a8ac076eaadeb2f4308137f5eb97841bf0bb421fffbe72054606b7c1219a6ed2295924e832edb4bb0dfc69cff87a9c67cba3d1237f5c2485f
-
Filesize
558KB
MD5878246e11fbcd03ddeb376a24b420d43
SHA16d9dd68d62d580bb863cb0426c3ec51abdcc861c
SHA25697e3c4c4611fe0ba8b5a4cf5e62e230463916e5bd49787a2d9cbd52b011d12a0
SHA5121951b6bfa79a1d7a8ac076eaadeb2f4308137f5eb97841bf0bb421fffbe72054606b7c1219a6ed2295924e832edb4bb0dfc69cff87a9c67cba3d1237f5c2485f
-
Filesize
307KB
MD5bbe8b6e023650f086d1e3016a8f4a804
SHA1562740dc81c3b0022ed2b7331773d078652f3075
SHA2567758466edc522af8fb12badceb183c7446272c174821129a6129de9f275e63fb
SHA51233970df8755feae3eb7f36539bb70176da4b0c7c4be5e11d4dc1e40ffa1266b782ea88b0dd9d4b209602464daf79299e03bd900359e15b44f3b9afc48a31c9da
-
Filesize
307KB
MD5bbe8b6e023650f086d1e3016a8f4a804
SHA1562740dc81c3b0022ed2b7331773d078652f3075
SHA2567758466edc522af8fb12badceb183c7446272c174821129a6129de9f275e63fb
SHA51233970df8755feae3eb7f36539bb70176da4b0c7c4be5e11d4dc1e40ffa1266b782ea88b0dd9d4b209602464daf79299e03bd900359e15b44f3b9afc48a31c9da
-
Filesize
365KB
MD5b43f5819bbc4936a9b23cbde7b1c47a0
SHA131d6b73d3aff39220413259a309af8571c4e3b47
SHA2560b7291550f1be4011ddead9a54319cc660e580fa6606468b3b0f376c62836019
SHA512bb972dcf4e0fd4ab01d89e3c20d61dd4acdaebb31ade234352c69e5d99efff6a35b6d6b7402d98288699a39abbf9ad90d4f77764318d451b076823d58983bb98
-
Filesize
365KB
MD5b43f5819bbc4936a9b23cbde7b1c47a0
SHA131d6b73d3aff39220413259a309af8571c4e3b47
SHA2560b7291550f1be4011ddead9a54319cc660e580fa6606468b3b0f376c62836019
SHA512bb972dcf4e0fd4ab01d89e3c20d61dd4acdaebb31ade234352c69e5d99efff6a35b6d6b7402d98288699a39abbf9ad90d4f77764318d451b076823d58983bb98